Cyber Security for the Automotive

We report on experiences of IEC 62443 and Common Criteria security certification and penetration testing. This includes, based on examples, typical vulnerabilities that we were able to exploit. For instance, in a blackbox testing of a communication dongle we were able to extract data such as a vehicle identification numbers from unencrypted bluetooth, access lightning control via OBD-II and upload of malicious files to the customer servers.

Tags
Data and Resources
To access the resources you must log in

This item has no data

Identity

Description: The Identity category includes attributes that support the identification of the resource.

Field Value
PID https://www.doi.org/10.5281/zenodo.3577287
PID https://www.doi.org/10.5281/zenodo.3577286
URL https://zenodo.org/record/3577287
URL http://dx.doi.org/10.5281/zenodo.3577287
URL https://figshare.com/articles/Cyber_Security_for_the_Automotive/11435001
URL http://dx.doi.org/10.5281/zenodo.3577286
Access Modality

Description: The Access Modality category includes attributes that report the modality of exploitation of the resource.

Field Value
Access Right Open Access
Attribution

Description: Authorships and contributors

Field Value
Author Sanchez, Juan
Publishing

Description: Attributes about the publishing venue (e.g. journal) and deposit location (e.g. repository)

Field Value
Collected From Datacite; figshare; FigShare
Hosted By Zenodo; figshare; FigShare
Publication Date 2019-12-06
Publisher Zenodo
Additional Info
Field Value
Language English
Resource Type Other literature type; Conference object
system:type publication
Management Info
Field Value
Source https://science-innovation-policy.openaire.eu/search/publication?articleId=dedup_wf_001::8acd9b48367ae9fa01b163698034466c
Author jsonws_user
Last Updated 25 December 2020, 18:05 (CET)
Created 25 December 2020, 18:05 (CET)